EMC-owned RSA Security has denied reports that the company had entered into secret contracts with the NSA worth $10 million to use the flaws Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) as the default pseudorandom number generator for the company's encryptions products.

"Recent press coverage has asserted that RSA entered into a 'secret contract' with the NSA to incorporate a known flawed random number generator into its BSAFE encryption libraries. We categorically deny this allegation," RSA responded today in a blog post.

RSA said it made the decision to use Dual_EC_DRBG as the default in 2004, and that the algorithm was only one of a number of algorithms available to its users.

"RSA, as a security company, never divulges details of customer engagements, but we also categorically state that we have never entered into any contract or engaged in any project with the intention of weakening RSA's products, or introducing potential 'backdoors' into our products for anyone's use," the company said.

"If you know the secret numbers, you can predict the output of the random number generator after collecting just 32 bytes of its output," Schneier wrote.

"To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG."

In September, the National Institute of Standards and Technology (NIST) recommended against the use (PDF) of Dual_EC_DRBG. Following that recommendation, RSA did the same. Memos from the documents released by Edward Snowden, and seen by The New York Times, said that Dual_EC_DRBG contained a backdoor for the NSA.